透過您的圖書館登入
IP:18.116.36.192
  • 學位論文

網路威脅防禦策略之研究

A study of the network threat defense strategy

指導教授 : 廖秀莉
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


無庸置疑,網際網路改變了全世界溝通的方式,各式各樣的網際網路的應用不斷成長,也使得網際網路威脅更加多樣化,我們可以說網際網路的流行造就了網際網路威脅的成長。網際網路變成了每一個組織的必備工具,並且被極為廣泛的運用。面對日益猖獗的網路威脅,我們都知道各類型組織應該要採取更合乎時宜且適合其組織特性的防禦策略來因應。本研究假設組織網際網路依存度之差異與其遭受之網路威脅事件數量會呈現M型化的趨勢,將藉由探討網際網路依存度存在差異的數個組織,其遭遇分散式阻斷服務網路威脅及殭屍網路威脅狀況,來進行假說之驗證,並依據研究所得提出網路防禦策略模型,期望能讓各類型組織在訂定其防禦策略時能有所參考。

並列摘要


There is no doubt that the internet has revolutionized the way the world communicates and it continues to grow, driven by ever greater amounts of online applications. That high growth of internet applications also makes more diverse internet threat. We can say that the growth of threats is a result of the popularity of the internet. The internet has become an essential tool to every organization and has been used to perform a vast variety of operations. We can easily realize the growing threat of internet towards organizations and different type of organizations should take different defense strategies which suitable for its characteristic. In this research, we hypothesized that the dependence of internet and the number of internet threat s in different type of organizations will be M-shaped. For the verification, we investigate several organizations with deferent dependence of internet and collect the number of distributed denial of Service and botnet attacks. According to the research result, we will propose a model of network defense strategy. Expectantly, it will be helpful to all types of organizations are making their network defense strategy.

參考文獻


Sheng, Wen, Weijia, Jia, Wei, Zhou, Wanlei, Zhou, & Chuan, Xu. (2010). CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd. Paper presented at the Network and System Security (NSS), 2010 4th International Conference on.
Vijayalakshmi, M., Mercy Shalinie, S., & Arun Pragash, A. (2012). IP traceback system for network and application layer attacks. Paper presented at the Recent Trends In Information Technology (ICRTIT), 2012 International Conference on.
Bakshi, A., & Yogesh, B. (2010). Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine. Paper presented at the Communication Software and Networks, 2010. ICCSN '10. Second International Conference on.
Birman, K. (2005). Can Web services scale up? Computer, 38(10), 107-110. doi: 10.1109/mc.2005.332
Demir, O., & Khan, B. (2011). Finding DDoS attack sources: Searchlight localization algorithm for network tomography. Paper presented at the Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International.

延伸閱讀